語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Hacking web intelligence : = open so...
~
Chauhan, Sudhanshu,
FindBook
Google Book
Amazon
博客來
Hacking web intelligence : = open source intelligence and web reconnaissance concepts and techniques /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Hacking web intelligence :/ Sudhanshu Chauhan, Nutan Kumar Panda.
其他題名:
open source intelligence and web reconnaissance concepts and techniques /
作者:
Chauhan, Sudhanshu,
其他作者:
Panda, Nutan Kumar,
面頁冊數:
1 online resource :illustrations
附註:
Includes index.
內容註:
Front Cover; Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques; Copyright; Contents; Preface; WHAT THIS BOOK COVERS; HOW DO YOU PRACTICE; TO WHOM THIS BOOK IS FOR; About the Authors; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; Acknowledgments; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; Chapter 1 -- Foundation: Understanding the Basics; INTRODUCTION; INTERNET; WORLD WIDE WEB; DEFINING THE BASIC TERMS; WEB BROWSING-BEHIND THE SCENE; LAB ENVIRONMENT; Chapter 2 -- Open Source Intelligence and Advanced Social Media Search; INTRODUCTION; OPEN SOURCE INTELLIGENCE.
內容註:
HOW WE COMMONLY ACCESS OSINTWEB 2.0; SOCIAL MEDIA INTELLIGENCE; SOCIAL NETWORK; ADVANCED SEARCH TECHNIQUES FOR SOME SPECIFIC SOCIAL MEDIA; WEB 3.0; Chapter 3 -- Understanding Browsers and Beyond; INTRODUCTION; BROWSER OPERATIONS; HISTORY OF BROWSERS; BROWSER ARCHITECTURE; BROWSER FEATURES; RAW BROWSERS; SOME OF THE WELL-KNOWN CUSTOM BROWSERS; ADDONS; BOOKMARK; THREATS POSED BY BROWSERS; Chapter 4 -- Search the Web-Beyond Convention; INTRODUCTION; Chapter 5 -- Advanced Web Searching; INTRODUCTION; GOOGLE; BING; YAHOO; YANDEX; Chapter 6 -- OSINT Tools and Techniques; INTRODUCTION; CREEPY.
內容註:
THEHARVESTERSHODAN; SEARCH DIGGITY; YAHOO PIPES; MALTEGO; Chapter 7 -- Metadata; INTRODUCTION; METADATA EXTRACTION TOOLS; IMPACT; METADATA REMOVAL/DLP TOOLS; Chapter 8 -- Online Anonymity; ANONYMITY; ONLINE ANONYMITY; WHY DO WE NEED TO BE ANONYMOUS; WAYS TO BE ANONYMOUS; Chapter 9 -- Deepweb: Exploring the Darkest Corners of the Internet; INTRODUCTION; WHY TO USE IT?; WHY NOT TO USE IT?; DARKNET SERVICES; DISCLAIMER; Chapter 10 -- Data Management and Visualization; INTRODUCTION; DATA MANAGEMENT AND ANALYSIS TOOLS; Chapter 11 -- Online Security; INTRODUCTION; MALWARES; PHISHING.
內容註:
ONLINE SCAMS AND FRAUDSHACKING ATTEMPTS; WEAK PASSWORD; SHOULDER SURFING; SOCIAL ENGINEERING; ANTIVIRUS; IDENTIFY PHISHING/SCAMS; UPDATE OPERATING SYSTEM AND OTHER APPLICATIONS; ADDONS FOR SECURITY; TOOLS FOR SECURITY; PASSWORD POLICY; PRECAUTIONS AGAINST SOCIAL ENGINEERING; DATA ENCRYPTION; Chapter 12 -- Basics of Social Networks Analysis; INTRODUCTION; GEPHI; NODE ATTRIBUTES; EDGE ATTRIBUTES; Chapter 13 -- Quick and Dirty Python; INTRODUCTION; Chapter 14 -- Case Studies and Examples; INTRODUCTION; CASE STUDIES; Chapter 15 -- Related Topics of Interest; INTRODUCTION; CRYPTOGRAPHY.
內容註:
DATA RECOVERY/SHREDDINGINTERNET RELAY CHAT; BITCOIN; Index.
標題:
World Wide Web. -
電子資源:
https://www.sciencedirect.com/science/book/9780128018675
ISBN:
9780128019122
Hacking web intelligence : = open source intelligence and web reconnaissance concepts and techniques /
Chauhan, Sudhanshu,
Hacking web intelligence :
open source intelligence and web reconnaissance concepts and techniques /Sudhanshu Chauhan, Nutan Kumar Panda. - 1 online resource :illustrations
Includes index.
Front Cover; Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques; Copyright; Contents; Preface; WHAT THIS BOOK COVERS; HOW DO YOU PRACTICE; TO WHOM THIS BOOK IS FOR; About the Authors; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; Acknowledgments; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; Chapter 1 -- Foundation: Understanding the Basics; INTRODUCTION; INTERNET; WORLD WIDE WEB; DEFINING THE BASIC TERMS; WEB BROWSING-BEHIND THE SCENE; LAB ENVIRONMENT; Chapter 2 -- Open Source Intelligence and Advanced Social Media Search; INTRODUCTION; OPEN SOURCE INTELLIGENCE.
Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment-that is, reconnaissance-is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence. You will also learn how to secure your information online to prevent it being discovered by these reconnaissance methods. Hacking Web Intelligence is an in-depth technical reference covering the methods and techniques you need to unearth open source information from the Internet and utilize it for the purpose of targeted attack during a security assessment. This book will introduce you to many new and leading-edge reconnaissance, information gathering, and open source intelligence methods and techniques, including metadata extraction tools, advanced search engines, advanced browsers, power searching methods, online anonymity tools such as TOR and i2p, OSINT tools such as Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, Social Network Analysis (SNA), Darkweb/Deepweb, data visualization, and much more.
ISBN: 9780128019122
LCCN: 2015933572Subjects--Topical Terms:
534287
World Wide Web.
Index Terms--Genre/Form:
542853
Electronic books.
LC Class. No.: TK5105.888
Dewey Class. No.: 004.678
Hacking web intelligence : = open source intelligence and web reconnaissance concepts and techniques /
LDR
:05347nmm a2200361 i 4500
001
2181981
006
m o d
007
cr cnu|unuuu||
008
191128s2015 maua o 001 0 eng d
010
$a
2015933572
020
$a
9780128019122
$q
(electronic bk.)
020
$a
0128019123
$q
(electronic bk.)
020
$a
9780128018675
020
$a
0128018674
035
$a
(OCoLC)907467285
$z
(OCoLC)908073540
$z
(OCoLC)909802687
$z
(OCoLC)915731918
$z
(OCoLC)1117872723
035
$a
els19100105
040
$a
N$T
$b
eng
$e
rda
$e
pn
$c
N$T
$d
N$T
$d
OPELS
$d
E7B
$d
YDXCP
$d
UMI
$d
IDEBK
$d
CDX
$d
COO
$d
DEBBG
$d
EBLCP
$d
B24X7
$d
OCLCF
$d
IDB
$d
Z5A
$d
VGM
$d
LIV
$d
OCLCQ
$d
MERUC
$d
OCLCQ
$d
UPM
$d
WRM
$d
U3W
$d
D6H
$d
CEF
$d
OCLCQ
$d
CUY
$d
LOA
$d
G3B
$d
CNCEN
$d
S8J
$d
ICG
$d
K6U
$d
COCUF
$d
CNNOR
$d
VT2
$d
DCT
041
0
$a
eng
050
4
$a
TK5105.888
082
0 4
$a
004.678
$2
23
100
1
$a
Chauhan, Sudhanshu,
$e
author.
$3
3389824
245
1 0
$a
Hacking web intelligence :
$b
open source intelligence and web reconnaissance concepts and techniques /
$c
Sudhanshu Chauhan, Nutan Kumar Panda.
264
1
$a
Waltham, MA :
$b
Syngress, an imprint of Elsevier,
$c
2015.
300
$a
1 online resource :
$b
illustrations
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Includes index.
505
0
$a
Front Cover; Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques; Copyright; Contents; Preface; WHAT THIS BOOK COVERS; HOW DO YOU PRACTICE; TO WHOM THIS BOOK IS FOR; About the Authors; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; Acknowledgments; SUDHANSHU CHAUHAN; NUTAN KUMAR PANDA; Chapter 1 -- Foundation: Understanding the Basics; INTRODUCTION; INTERNET; WORLD WIDE WEB; DEFINING THE BASIC TERMS; WEB BROWSING-BEHIND THE SCENE; LAB ENVIRONMENT; Chapter 2 -- Open Source Intelligence and Advanced Social Media Search; INTRODUCTION; OPEN SOURCE INTELLIGENCE.
505
8
$a
HOW WE COMMONLY ACCESS OSINTWEB 2.0; SOCIAL MEDIA INTELLIGENCE; SOCIAL NETWORK; ADVANCED SEARCH TECHNIQUES FOR SOME SPECIFIC SOCIAL MEDIA; WEB 3.0; Chapter 3 -- Understanding Browsers and Beyond; INTRODUCTION; BROWSER OPERATIONS; HISTORY OF BROWSERS; BROWSER ARCHITECTURE; BROWSER FEATURES; RAW BROWSERS; SOME OF THE WELL-KNOWN CUSTOM BROWSERS; ADDONS; BOOKMARK; THREATS POSED BY BROWSERS; Chapter 4 -- Search the Web-Beyond Convention; INTRODUCTION; Chapter 5 -- Advanced Web Searching; INTRODUCTION; GOOGLE; BING; YAHOO; YANDEX; Chapter 6 -- OSINT Tools and Techniques; INTRODUCTION; CREEPY.
505
8
$a
THEHARVESTERSHODAN; SEARCH DIGGITY; YAHOO PIPES; MALTEGO; Chapter 7 -- Metadata; INTRODUCTION; METADATA EXTRACTION TOOLS; IMPACT; METADATA REMOVAL/DLP TOOLS; Chapter 8 -- Online Anonymity; ANONYMITY; ONLINE ANONYMITY; WHY DO WE NEED TO BE ANONYMOUS; WAYS TO BE ANONYMOUS; Chapter 9 -- Deepweb: Exploring the Darkest Corners of the Internet; INTRODUCTION; WHY TO USE IT?; WHY NOT TO USE IT?; DARKNET SERVICES; DISCLAIMER; Chapter 10 -- Data Management and Visualization; INTRODUCTION; DATA MANAGEMENT AND ANALYSIS TOOLS; Chapter 11 -- Online Security; INTRODUCTION; MALWARES; PHISHING.
505
8
$a
ONLINE SCAMS AND FRAUDSHACKING ATTEMPTS; WEAK PASSWORD; SHOULDER SURFING; SOCIAL ENGINEERING; ANTIVIRUS; IDENTIFY PHISHING/SCAMS; UPDATE OPERATING SYSTEM AND OTHER APPLICATIONS; ADDONS FOR SECURITY; TOOLS FOR SECURITY; PASSWORD POLICY; PRECAUTIONS AGAINST SOCIAL ENGINEERING; DATA ENCRYPTION; Chapter 12 -- Basics of Social Networks Analysis; INTRODUCTION; GEPHI; NODE ATTRIBUTES; EDGE ATTRIBUTES; Chapter 13 -- Quick and Dirty Python; INTRODUCTION; Chapter 14 -- Case Studies and Examples; INTRODUCTION; CASE STUDIES; Chapter 15 -- Related Topics of Interest; INTRODUCTION; CRYPTOGRAPHY.
505
8
$a
DATA RECOVERY/SHREDDINGINTERNET RELAY CHAT; BITCOIN; Index.
520
$a
Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment-that is, reconnaissance-is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence. You will also learn how to secure your information online to prevent it being discovered by these reconnaissance methods. Hacking Web Intelligence is an in-depth technical reference covering the methods and techniques you need to unearth open source information from the Internet and utilize it for the purpose of targeted attack during a security assessment. This book will introduce you to many new and leading-edge reconnaissance, information gathering, and open source intelligence methods and techniques, including metadata extraction tools, advanced search engines, advanced browsers, power searching methods, online anonymity tools such as TOR and i2p, OSINT tools such as Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, Social Network Analysis (SNA), Darkweb/Deepweb, data visualization, and much more.
650
0
$a
World Wide Web.
$3
534287
650
0
$a
Open source intelligence.
$3
911920
650
0
$a
Computer networks
$x
Security measures.
$3
579161
655
4
$a
Electronic books.
$2
lcsh
$3
542853
700
1
$a
Panda, Nutan Kumar,
$e
author.
$3
3389825
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128018675
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9370865
電子資源
11.線上閱覽_V
電子書
EB TK5105.888
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入